lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Tue, 15 Sep 2015 10:12:09 -0600
From:	Shuah Khan <shuahkh@....samsung.com>
To:	Jiri Slaby <jslaby@...e.cz>, stable@...r.kernel.org,
	mark.d.rustad@...el.com
Cc:	linux@...ck-us.net, shuah.kh@...sung.com,
	linux-kernel@...r.kernel.org
Subject: Re: [PATCH 3.12 00/33] 3.12.48-stable review

On 09/15/2015 08:22 AM, Jiri Slaby wrote:
> This is the start of the stable review cycle for the 3.12.48 release.
> There are 33 patches in this series, all will be posted as a response
> to this one.  If anyone has any issues with these being applied, please
> let me know.
> 
> Responses should be made by Thu Sep 17 16:20:25 CEST 2015.
> Anything received after that time might be too late.
> 
> The whole patch series can be found in one patch at:
> 	http://kernel.org/pub/linux/kernel/people/jirislaby/stable-review/patch-3.12.48-rc1.xz
> and the diffstat can be found below.
> 
> thanks,
> js

Jiri,

I am seeing problems during PCI scans with this patch. I had
to boot it in recovery mode once and it is booting fine after
that, however, this is a concern

Could these be the reason?

Mark Rustad (2):
  PCI: Add dev_flags bit to access VPD through function 0
  PCI: Add VPD function 0 quirk for Intel Ethernet devices


PCI-DMA: Intel(R) Virtualization Technology for Directed I/O
------------[ cut here ]------------
WARNING: CPU: 0 PID: 1 at drivers/pci/search.c:46
pci_find_upstream_pcie_bridge+
0x65/0x90()
Modules linked in:
CPU: 0 PID: 1 Comm: swapper/0 Not tainted 3.12.48+ #29
Hardware name: System76, Inc. Wild Dog Performance/H87-PLUS, BIOS 0705
12/05/201
3
 0000000000000009 ffff88040952bd28 ffffffff81718bd7 0000000000000000
 ffff88040952bd60 ffffffff8106497d ffff88040801c098 ffff88040801c000
 ffff88040801c098 0000000000000000 ffff88040f0058a0 ffff88040952bd70
Call Trace:
 [<ffffffff81718bd7>] dump_stack+0x45/0x56
 [<ffffffff8106497d>] warn_slowpath_common+0x7d/0xa0
 [<ffffffff81064a5a>] warn_slowpath_null+0x1a/0x20
 [<ffffffff813b75d5>] pci_find_upstream_pcie_bridge+0x65/0x90
 [<ffffffff815fb10d>] intel_iommu_add_device+0x4d/0x220
 [<ffffffff815f2000>] ? bus_set_iommu+0x50/0x50
 [<ffffffff815f202a>] add_iommu_group+0x2a/0x60
 [<ffffffff81497aab>] bus_for_each_dev+0x6b/0xb0
 [<ffffffff815f1ff8>] bus_set_iommu+0x48/0x50
 [<ffffffff81d93ef3>] intel_iommu_init+0xa9d/0xb9c
 [<ffffffff81d4a730>] ? memblock_find_dma_reserve+0x124/0x124
 [<ffffffff81d4a742>] pci_iommu_init+0x12/0x3c
 [<ffffffff810020d2>] do_one_initcall+0xd2/0x1a0
 [<ffffffff81087700>] ? parse_args+0x160/0x490
 [<ffffffff81d40ef6>] kernel_init_freeable+0x144/0x1cc
 [<ffffffff8170cfe0>] ? rest_init+0x80/0x80
 [<ffffffff8170cfee>] kernel_init+0xe/0x190
 [<ffffffff81728fd8>] ret_from_fork+0x58/0x90
 [<ffffffff8170cfe0>] ? rest_init+0x80/0x80
---[ end trace 6540c4180167ec85 ]---
Scanning for low memory corruption every 60 seconds
Initialise module verification
audit: initializing netlink socket (disabled)
type=2000 audit(1442332755.772:1): initialized
bounce pool size: 64 pages
HugeTLB registered 2 MB page size, pre-allocated 0 pages
zbud: loaded



-- 
Shuah Khan
Sr. Linux Kernel Developer
Open Source Innovation Group
Samsung Research America (Silicon Valley)
shuahkh@....samsung.com | (970) 217-8978
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ